DISCLAIMER

This weblog is created for the purposes of an MBA project for the subject BYL 7134, Cyberlaw. The materials posted on this weblog are for the purposes of the assignment as well as study and non-profit research. Appropriate acknowledgments to the materials that do not belong to the weblog owner have been publicly made. If you are the author or a copyright owner of any of the articles posted in this weblog and you object to such posting on any grounds, including copyright infringement, please contact me and I will take your material down. I state herein that I am relying on the doctrine of fair use. Thank you for supporting my blog.

Saturday, April 17, 2010

Wiretapping in Cyberspace

The advent of cyberspace has introduced a variety of new Internet Protocol communications including VoIP, e-mails, instant messages, blogs and social networking. These new means of communication have added complexity to surveillance because they may use open public networks that are less definable, accessible and traceable for law enforcement officials than were the traditional hard-wired telco switching technologies. Blogging and social networking added yet another layer of complexity due to their use of complex Web site http protocols. Pervasive IP communications – such as Blackberries – provide users with IP communications access wherever they travel and therefore create moving targets.
Additionally, each communication record itself has become more complex, with only 30 percent of the volume of some IP communications pertaining to the actual content and associated attributes, while the remaining 70 percent may consist of redundant packet level data, duplicate header information and Internet housekeeping protocols like Domain Name System (DNS).

3 comments:

  1. Wiretapping is mostly used in which situations? and in which countries it can be seen more?

    ReplyDelete
  2. This comment has been removed by the author.

    ReplyDelete
  3. I think countries with high level of technology are very concern about this problem. It means for countries like USA that people face with many kind of networks in their daily life with different devices, security of their information that is transfered are so important.On the other hand, because of importance of these kind of information in developed countries, tapping is more likely to be done.

    ReplyDelete